Testing Web Services for Robustness: A Tool Demo
|
|
- Marion West
- 8 years ago
- Views:
Transcription
1 Testing Web Services for Robustness: A Tool Demo Nuno Laranjeiro, Marco Vieira To cite this version: Nuno Laranjeiro, Marco Vieira. Testing Web Services for Robustness: A Tool Demo. Hélène WAESELYNCK. 12th European Workshop on Dependable Computing, EWDC 2009, May 2009, France. 4 p. <hal > HAL Id: hal Submitted on 12 May 2009 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Testing Web Services for Robustness: A Tool Demo Nuno Laranjeiro, Marco Vieira CISUC, Department of Informatics Engineering University of Coimbra Portugal cnl@dei.uc.pt, mvieira@dei.uc.pt Abstract Web services represent a powerful interface for back-end systems that must provide a robust interface to client applications, even in the presence of invalid inputs. However, developing robust services is a difficult task. In this paper we demonstrate wsrbench, an online tool that facilitates web services robustness testing. Additionally, we present two scenarios to motivate robustness testing and to demonstrate the power of robustness testing in web services environments. 1. Introduction Web services are supported by an infrastructure that typically includes an application server, the operating system and a set of external systems (e.g., databases, payment gateways, etc). The Simple Object Access Protocol (SOAP) [1] is used for exchanging XMLbased messages between the consumer and the provider over the network. A web service may include several operations (in practice, each operation is a method with one or several input parameters) and is described using WSDL (Web Services Definition Language) [1], which is a XML format used to generate server and client code, and for configuration. Robustness testing is an effective technique to characterize the behavior of a system in presence of erroneous input conditions. It has been successfully used to assess the robustness of operating systems [3], [6] and recently has been extended to the evaluation of web services [4], [9]. Robustness tests stimulate the system under testing through its interfaces ( black-box testing) by submitting erroneous input conditions that may trigger internal errors. wsrbench [4], an online tool based on the work presented in [9], is a powerful instrument in three key scenarios: 1) help providers in evaluating and improving the robustness of their web services implementations before deployment; 2) help consumers to select the web services that best fit their requirements by testing different alternatives; and 3) help providers and consumers to identify the need for wrappers to perform the required validations before execution. The goal of this paper is to demonstrate how wsrbench can be used in practice. The goal is not to present technical details (those are available in [4], [9]), but to demonstrate the tool and present scenarios on how to use it to develop robust web services. This way, we discuss two hypothetical scenarios and two real case studies on the usage of wsrbench. The hypothetical scenarios serve as motivation to apply robustness testing in web services environments and the real case studies show that robustness testing can be applied in practice to test and compare real web services. The structure of the paper is as follows. Next section presents motivation scenarios. Section 3 summarizes the robustness testing approach and introduces wsrbench. Section 4 presents two case studies. Section 5 briefly describes the demo to be performed during the workshop and concludes the paper. 2. Motivation scenarios In this section we present two hypothetical scenarios of the usage of robustness testing Scenario #1: Selecting a web service SurveyMe is a medium size company that performs customer satisfaction surveys for large companies. As surveys are typically conducted by phone, it is of utmost importance to guarantee the correctness of the phone numbers registered in the database. A frequent situation is to find phone numbers in the database with incorrect country codes, area codes, or prefixes, due to mistakes during data collection or storage. Mr. Simms, the head of the division in charge of analyzing the results of the surveys, is concerned with the number of surveys that are not conducted, or are delayed, due to incorrect phone numbers. Mr. Simms decided to meet with Mr. Pinto, the head of the division in charge of managing and improving the software used by the company, to discuss this situation and understand if the phone number verification rules used by the application could be improved. While surfing in the Internet for potential solutions, Mr. Pinto browsed through a web page that called his attention. WebX, the owner of that web page, announces a web service that can be used to ver-
3 ify phone numbers around the world. Amazingly, the use of this web service is free of charge. This is very good and it can be easily integrated in our application thought Mr. Pinto, while searching for other services providing similar functionality. After some minutes, Mr. Pinto found two other options, both free of charge. Mr. Pinto decided use an external web service to perform phone numbers validation. However, in order to maintain the robustness of the application they needed to select a robust web service. The problem was then how to choose the web service to be used. Some time ago, Mr. Pinto read a research paper on a tool for web services robustness testing [4]. He recalled that the tool (wsrbench) was online and free to use, and decided to try the tool to test the web services. The results were impressive. With a simple configuration procedure the tool was able to automatically test the services and detect potential robustness problems. In fact, Mr. Pinto only provided the tool with the URL of each service and configured the expected domain for each input parameter. Table 1 summarizes the results. From the robustness point-of-view, TelefX should be the selected service, as it presents no robustness problems. However, this was the first step in the selection process as Mr. Pinto decided then to test the services for performance. In any case, the information gathered about these services was of utmost importance. In fact, even if one of the services with robustness issues is selected due to performance reasons the development team knows its robustness problems in detail. This information can be used to implement wrappers that perform parameter validation before web service invocation Scenario #2: Developing a web service Electrics.com is a large company specialized in producing electrical components that recently decided to develop a new database application to manage daily operations. A service-oriented approach in which a set of web services provides functionalities that can be invoked by client applications in a transparent manner. The plan was to follow an interactive lifecycle during the project. The web services would be developed first and the different user interfaces implemented afterwards. The web services would be tested immediately after their development phase. During the development of the interface to register new customers, Sanders, a junior programmer, was Table 1 Robustness-testing results for Scenario #1. Service Name Operation Parameter # Abort Failures # Hindering Failures PhoneNumbers ValidatePhone PhoneNumber 3 0 PhonesWS CheckPhone Phone 0 1 TelefX CheckNumber PhoneNumber 0 0 struggling with a problem. When inputting some values in this web page, the application returns an unexpected exception. After several hours analyzing his code Sanders was not able to find any problem and decided to perform some tests in the web services using wsrbench, an online tool he had recently found while surfing in the web [4]. After reading some documentation about the tool, Sanders started the tests by configuring some parameters. The result obtained was not a surprise for Sanders: the newcustomer web service had a problem. When a long contact was provided the web service returned a StackOverflowException exception. This way, Sanders decided to analyze the web service code in order to identify the source of the problem. However, after some hours, he was not able to identify any problem, not even with help of some other developers. Sanders then decided to ask for the help of a senior developer John, not involved in the project, but an expert in web services development. After some minutes analyzing the code, John identified the source of the problem: although the code targeting the validation of the contact parameter was in place, too large addresses caused the web service to throw a StackOverflowException. After some analysis of the code they concluded that the problem resided in the external API that was being used to validate addresses (Jakarta Commons Validator 1.3.0). This shows that robustness problems may occur even when programmers pay great attention to the code correctness. In fact, the use of third party software can raise problems that are not obvious for programmers. 3. wsrbench: A web services robustness testing tool Web services robustness testing is based on erroneous call parameters [9]. The robustness tests consist of exceptional and acceptable input values of parameters of web services operations that can be generated by applying a set of predefined rules according to the data types of each parameter. The robustness benchmark includes the following key components: workload (represents the work that the service must perform during the benchmark run); robustness tests (set of invalid call parameters that is applied to expose robustness problems); and failure modes classification (characterize the behavior of the web service while executing the workload in the presence of the robustness tests). The testing procedure is based on the following generic set of steps: 1. Tests preparation 1.1 Analysis of the WSDL of the web service under testing in order to gather information about the
4 relevant operations, parameters, and data types. 1.2 Workload generation. 2. Tests execution 2.1 Execution of the workload generated in step 1.2. The goal is to understand the expected correct behavior for the service. 2.2 Execution of the robustness tests in order to trigger faulty behaviors, and in that way disclose robustness problems. 3. Service characterization, including failure modes identification (using the data collected in step 2). The robustness of the web services is classified according to an adapted version of the CRASH scale [3] (the wscrash scale) that distinguishes the following failure modes: Catastrophic (the application server used to run the web service under testing becomes corrupted or the machine crashes or reboots), Restart (the web service execution hangs and must be terminated by force), Abort (abnormal termination of the web service execution), Silent (no error is indicated by the application server), and Hindering (the error code returned is not correct or the response is delayed). wsrbench, publicly available at implements the web services testing approach proposed in [9] and provides a web based interface that allows users to perform configurations and visualize the results of tests. Note that, anyone can use wsrbench as it is free and very easy to use. Only a very simple registration and posterior authentication process is required. In the following paragraphs we introduce the key functionalities of wsrbench (technical details can be found in [4]). After registration and authentication three key options are available for users: Configuration; Add WSDL; and My Tests. The Configuration option allows several configuration aspects to be defined, such as the user s , number of finished tests to show on screen, etc. The Add WSDL option allows users to add the WSDL file describing a web service to be tested for robustness. After submitting the WSDL file the user can visualize the set of operations and parameters provided by the service. Operations not conformant with the WS-I Basic Profile [2] will be grayed out and not tested. This standard is an industry effort to clarify the ambiguous parts of the WSDL specification and is accepted by the main service providers, including Microsoft s.net framework version 3 [5] and Sun Microsystem s Java 6 Web Services stack (JAX-WS) [7]. For each testable operation the user may define the valid values for each parameter (i.e., the domain of the parameter). When these are not defined, the tool considers that the parameter domain is the domain of the corresponding data type. After defining the domain of the parameters the tests can start (by clicking the Start Test button). The user will be informed by when the tests conclude. The My Tests option allows the user to visualize the tests previously performed along with information on currently ongoing tests. For each operation of a web service, the results for the individual faults applied to each parameter are shown. Clicking the XML link opens a popup where more details are provided. These include the list of requests sent and the service responses received. The user can mark the service interaction as a robustness problem, a correct interaction (no problem detected), or simply leave it unmarked. It is important to emphasize that, after testing a given web service, the tool performs an automatic analysis of the responses obtained in order to distinguish regular replies from replies that reveal robustness problems in the service being tested. However, in some cases the tool is not able to decide if a given response is due to a robustness problem or not. That is why the tool also allows users to perform this analysis manually. 4. wsrbench in practice In this section we present two case studies on using wsrbench to test and compare real web services Case Study #1: Testing public web services More than 100 publicly available web services were tested for robustness (most of these services are listed at a web site that references publicly available web services). The full list of web services tested can be found at [4]). About 35% of the web services tested presented robustness problems. Some silent failures were observed for two web services: Web-Service Documentation (owned by westwind.com) and Code 39 Bar Code (owned by webservicex.net). For the former, robustness tests consisting in the replacement of any parameter by a null value always leads to an absence of response from the server. For the latter, an overflowed string in the Title parameter led the server to report a null reference exception. However, web service requests submitted immediately after that abort failure remained unanswered. A total of 61 Abort failures (not counting similar errors triggered by different faults for the same parameter in a given operation) were detected. 30% were marked as null references, 30% as SQL problems, 13% conversion problems, 7% as arithmetic problems, and 21% as others.
5 4.2. Case Study #2: Comparing web services Two implementations of a subset of the TPC-App web services [8] were submitted to robustness testing (each web service implemented a single operation). As shown in Table 2, robustness problems related to abort failures were observed for both solutions. An interesting robustness problem was observed for the newcustomer service in implementation A. In fact, although the code targeting the validation of the contact parameter was in place, too large addresses caused the web service to throw a StackOverflowException. After analyzing the source code we concluded that the problem resided in the external API that was being used to validate addresses (Jakarta Commons Validator 1.3.0). This shows that robustness problems may occur even when programmers pay great attention to the code correctness. Furthermore, this type of errors can easily appear or disappear when an apparently harmless update is done to the external libraries commonly required by projects. However they can be easily detected with the help of robustness testing, which once more highlights the importance of robustness testing. The analysis of the results in Table 2 suggests that, from a consumer standpoint, the best option would be to choose the newproducts and productdetail services from implementation A, and the changepayment- Method and newcostumer services from implementation B. From the provider point-of-view, it is clear that some software improvements are needed in order to resolve the robustness problems detected. 5. Conclusion Table 2 Abort failures for TPC-App services. Web Service Impl. A Impl. B changepayment method 3 3 newcustomer 15 6 newproducts 0 2 productdetail 0 1 The goal of this paper is to demonstrate a tool for web services robustness testing. This tool builds on solid scientific concepts proposed in previous works, and seals the space between research and industry practice. In fact, wsrbench fills a gap in current development tools, providing an easy interface for robustness testing of web services. The tool is available online requiring no installation and little configuration effort. Its effectiveness will be demonstrated during the workshop and has already been proved by testing a large number of public and custom made web services. The results show that many services are deployed with robustness problems that, in some cases, may also represent security issues. For example, some of the problems uncovered show that some services may be vulnerabl to SQL injection attacks, which highlights the importance of testing services for robustness. This is something that could be easily avoided if these services were tested for robustness by wsrbench. The wsrbench demo during the workshop will be organized as follows. First we will discuss basic concepts on robustness testing and present the two hypothetical scenarios for the use of robustness testing in web services environments. Then we will introduce the key functionalities of the tool. Finally, we will show the power of the tool in practice by applying it to several web services publicly available in the Internet and to some of the web services from the TPC-App performance benchmark. In the latter case, we will demonstrate how the robustness problems disclosed can be fixed by adding appropriate input validators. It is important to emphasize that we are planning a hands-on demo. In fact, the tool will be effectively demonstrated and explained during the talk. Participants will have the possibility to try the tool during or after the workshop. Our goal is to motivate researchers and practitioners working on web services to try it and to foster research on this important topic. 6. References [1] Curbera, F., et al., Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI, Internet Computing, IEEE, vol. 6, 2002, pp [2] Ferris, C., et al., Basic Profile - Version 1.2, 2007; [3] Koopman, P., DeVale, J., "Comparing the robustness of POSIX operating systems," Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, [4] Laranjeiro, N., Canelas, S., Vieira, M., "wsrbench: An On-Line Tool for Robustness Benchmarking", IEEE International Conference on Services Computing (SCC 2008), Honolulu, Hawaii, USA, July [5] Microsoft,.NET Framework Developer Center, 2008; [6] Rodríguez, M., et al., "MAFALDA: Microkernel Assessment by fault injection and design aid", 3rd European Dependable Computing Conference, EDCC-3, [7] Sun Microsystems, Inc., JAX-WS Reference Implementation ; [8] Transaction Processing Performance Council, TPC BenchmarkTM App (Application Server) Standard Specification, Version 1.1, 2005, available at: [9] Vieira, M., Laranjeiro, N., Madeira, H., Benchmarking the Robustness of Web Services, 13th IEEE Pacific Rim Dependable Computing Conference (PRDC 2007), Melbourne, Australia, 2007.
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
More informationMobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
More informationA graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
More informationProtecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
More informationA usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
More informationDetecting SQL Injection Vulnerabilities in Web Services
Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web
More informationStudy on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
More informationQASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
More informationFP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
More informationManaging Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
More informationAdditional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
More informationGlobal Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
More informationFaut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
More informationOnline vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
More informationControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development
ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida To cite this version: Stefanie Scherzinger, Thomas
More informationInformation Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
More informationUsing Web Security Scanners to Detect Vulnerabilities in Web Services
FACULDADE DE CIÊNCIAS E TECNOLOGIA DA UNIVERSIDADE DE COIMBRA DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira Nuno Antunes Henrique
More informationAligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
More informationUse of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
More informationDiscussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
More informationVR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
More informationProtecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
More informationExpanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
More informationThe Devils Behind Web Application Vulnerabilities
The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium
More informationOverview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
More informationTerritorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
More informationIntroClassJava: A Benchmark of 297 Small and Buggy Java Programs
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs Thomas Durieux, Martin Monperrus To cite this version: Thomas Durieux, Martin Monperrus. IntroClassJava: A Benchmark of 297 Small and Buggy
More informationANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
More informationGDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
More informationAn update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
More informationAutomated Faultinjection Series - Risk Management and Implementation
HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing Applications Christof Fetzer, Zhen Xiao AT&T Labs Research 180 Park Avenue Florham Park, N.J. 07932 christof, xiao @research.att.com
More informationMinkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
More informationNovel Client Booking System in KLCC Twin Tower Bridge
Novel Client Booking System in KLCC Twin Tower Bridge Hossein Ameri Mahabadi, Reza Ameri To cite this version: Hossein Ameri Mahabadi, Reza Ameri. Novel Client Booking System in KLCC Twin Tower Bridge.
More informationThe Effectiveness of non-focal exposure to web banner ads
The Effectiveness of non-focal exposure to web banner ads Marc Vanhuele, Didier Courbet, Sylvain Denis, Frédéric Lavigne, Amélie Borde To cite this version: Marc Vanhuele, Didier Courbet, Sylvain Denis,
More informationNew implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
More informationTowards Collaborative Learning via Shared Artefacts over the Grid
Towards Collaborative Learning via Shared Artefacts over the Grid Cornelia Boldyreff, Phyo Kyaw, Janet Lavery, David Nutter, Stephen Rank To cite this version: Cornelia Boldyreff, Phyo Kyaw, Janet Lavery,
More informationFlauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
More informationSELECTIVELY ABSORBING COATINGS
SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),
More informationA model driven approach for bridging ILOG Rule Language and RIF
A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.
More informationCobi: Communitysourcing Large-Scale Conference Scheduling
Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi
More informationRobustness and Security Testing in SOA
Outline n The SOA trend Robustness and Security Testing in SOA Challenges & Opportunities n Robustness and security testing in Web Services n Are Web Services robust and/or secure? n Is it done? No, there
More informationAdaptive Fault Tolerance in Real Time Cloud Computing
Adaptive Fault Tolerance in Real Time Cloud Computing Sheheryar Malik, Fabrice Huet To cite this version: Sheheryar Malik, Fabrice Huet. Adaptive Fault Tolerance in Real Time Cloud Computing. 2011 IEEE
More informationUsing Web Security Scanners to Detect Vulnerabilities in Web Services
DSN 2009 Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira,, Henrique Madeira {mvieira, nmsa, henrique}@dei.uc.pt CISUC Department of Informatics Engineering University
More informationISO9001 Certification in UK Organisations A comparative study of motivations and impacts.
ISO9001 Certification in UK Organisations A comparative study of motivations and impacts. Scott McCrosson, Michele Cano, Eileen O Neill, Abdessamad Kobi To cite this version: Scott McCrosson, Michele Cano,
More informationDissertation Masters in Informatics Engineering
Dissertation Masters in Informatics Engineering Evaluating Web Services Security Nuno Manuel dos Santos Antunes nmsa@dei.uc.pt Advisor: Prof. Marco Vieira 10-07-2009 Department of Informatics Engineering
More informationOntology-based Tailoring of Software Process Models
Ontology-based Tailoring of Software Process Models Ricardo Eito-Brun To cite this version: Ricardo Eito-Brun. Ontology-based Tailoring of Software Process Models. Terminology and Knowledge Engineering
More informationWhat Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model Seungwoo Kang, Sandrine Selosse, Nadia Maïzi To cite this version: Seungwoo Kang, Sandrine
More informationTowards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
More informationComparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, nmsa@dei.uc.pt, mvieira@dei.uc.pt University
More informationCloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
More informationOptimization results for a generalized coupon collector problem
Optimization results for a generalized coupon collector problem Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers, Bruno Sericola To cite this version: Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers,
More informationRunning an HCI Experiment in Multiple Parallel Universes
Running an HCI Experiment in Multiple Parallel Universes,, To cite this version:,,. Running an HCI Experiment in Multiple Parallel Universes. CHI 14 Extended Abstracts on Human Factors in Computing Systems.
More informationANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER
More informationProposal for the configuration of multi-domain network monitoring architecture
Proposal for the configuration of multi-domain network monitoring architecture Aymen Belghith, Bernard Cousin, Samer Lahoud, Siwar Ben Adj Said To cite this version: Aymen Belghith, Bernard Cousin, Samer
More informationApplication-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical
More informationWeb services commonly provide the strategic. Penetration Testing for Web Services
COVER FEATURE Penetration Testing for Web Services Nuno Antunes and Marco Vieira, University of Coimbra, Portugal Web services are often deployed with critical software security faults that open them to
More informationPerformance Evaluation of Encryption Algorithms Key Length Size on Web Browsers
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed
More informationAdvantages and disadvantages of e-learning at the technical university
Advantages and disadvantages of e-learning at the technical university Olga Sheypak, Galina Artyushina, Anna Artyushina To cite this version: Olga Sheypak, Galina Artyushina, Anna Artyushina. Advantages
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
More informationA Virtual Teacher Community to Facilitate Professional Development
A Virtual Teacher Community to Facilitate Professional Development Desislava Ratcheva, Eliza Stefanova, Iliana Nikolova To cite this version: Desislava Ratcheva, Eliza Stefanova, Iliana Nikolova. A Virtual
More informationThe truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
More informationE-commerce and Network Marketing Strategy
Towards Business Ontologies Matching for Inter-Enterprise Collaboration Platform in a Lean Manufacturing Strategy Ahlem Zayati, Lilia Sidhom, Youakim Badr, Frédérique Biennier, Mohamed Moalla To cite this
More informationWeb services with WebSphere Studio: Deploy and publish
Web services with WebSphere Studio: Deploy and publish Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Introduction...
More informationCracks detection by a moving photothermal probe
Cracks detection by a moving photothermal probe J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, M. Pigeon, J. Sellier To cite this version: J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, et
More informationHinky: Defending Against Text-based Message Spam on Smartphones
Hinky: Defending Against Text-based Message Spam on Smartphones Abdelkader Lahmadi, Laurent Delosière, Olivier Festor To cite this version: Abdelkader Lahmadi, Laurent Delosière, Olivier Festor. Hinky:
More informationAn Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
More informationEvaluating and Comparing the Impact of Software Faults on Web Servers
Evaluating and Comparing the Impact of Software Faults on Web Servers April 2010, João Durães, Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra {naaliel, jduraes, henrique}@dei.uc.pt
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
More informationVirtual plants in high school informatics L-systems
Virtual plants in high school informatics L-systems Janka Majherov To cite this version: Janka Majherov. Virtual plants in high school informatics L-systems. Michael E. Auer. Conference ICL2007, September
More informationDiversity against accidental and deliberate faults
Diversity against accidental and deliberate faults Yves Deswarte, Karama Kanoun, Jean-Claude Laprie To cite this version: Yves Deswarte, Karama Kanoun, Jean-Claude Laprie. Diversity against accidental
More informationA Contactless E-health Information System with Privacy
A Contactless E-health Information System with Privacy Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, Kumar Murty To cite this version: Aude Plateaux, Patrick Lacharme, Christophe Rosenberger,
More informationMultilateral Privacy in Clouds: Requirements for Use in Industry
Multilateral Privacy in Clouds: Requirements for Use in Industry Ina Schiering, Markus Hansen To cite this version: Ina Schiering, Markus Hansen. Multilateral Privacy in Clouds: Requirements for Use in
More informationDigital libraries: Comparison of 10 software
Digital libraries: Comparison of 10 Mathieu Andro, Emmanuelle Asselin, Marc Maisonneuve To cite this version: Mathieu Andro, Emmanuelle Asselin, Marc Maisonneuve. Digital libraries: Comparison of 10. Library
More informationUsing Feature Modelling and Automations to Select among Cloud Solutions
Using Feature Modelling and Automations to Select among Cloud Solutions Clément Quinton, Laurence Duchien, Patrick Heymans, Stéphane Mouton, Etienne Charlier To cite this version: Clément Quinton, Laurence
More informationIntroduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson
Introduction to Oracle WebLogic Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Agenda Overview Download and installation A concrete scenario using the real product Hints for the project Overview
More informationTraining Ircam s Score Follower
Training Ircam s Follower Arshia Cont, Diemo Schwarz, Norbert Schnell To cite this version: Arshia Cont, Diemo Schwarz, Norbert Schnell. Training Ircam s Follower. IEEE International Conference on Acoustics,
More informationModel-Driven Testing based on Markov Chain Usage Models in the Automotive Domain
Model-Driven Testing based on Markov Chain Usage Models in the Automotive Domain Sebastian Siegl, Winfried Dulz, Reinhard German, Gerhard Kiffe To cite this version: Sebastian Siegl, Winfried Dulz, Reinhard
More informationIdentifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA
Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA Duan Yucong, Christophe Cruz, Christophe Nicolle To cite this version: Duan Yucong, Christophe Cruz, Christophe Nicolle.
More informationPartial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation Florent Berthelot, Fabienne Nouvel, Dominique Houzet To cite this version: Florent Berthelot,
More informationInstalling the ASP.NET VETtrak APIs onto IIS 5 or 6
Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...
More informationA modeling approach for locating logistics platforms for fast parcels delivery in urban areas
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas Olivier Guyon, Nabil Absi, Dominique Feillet, Thierry Garaix To cite this version: Olivier Guyon, Nabil Absi,
More informationWide-Field Plate Database: Service for Astronomy
Wide-Field Plate Database: Service for Astronomy Milcho K. Tsvetkov To cite this version: Milcho K. Tsvetkov. Wide-Field Plate Database: Service for Astronomy. IMCCE. International Workshop NAROO-GAIA
More informationBuilding and Using Web Services With JDeveloper 11g
Building and Using Web Services With JDeveloper 11g Purpose In this tutorial, you create a series of simple web service scenarios in JDeveloper. This is intended as a light introduction to some of the
More informationPhysicians balance billing, supplemental insurance and access to health care
Physicians balance billing, supplemental insurance and access to health care Izabela Jelovac To cite this version: Izabela Jelovac. Physicians balance billing, supplemental insurance and access to health
More informationWebSphere Portal Server and Web Services Whitepaper
WebSphere Server and s Whitepaper Thomas Schaeck (schaeck@de.ibm.com) IBM Software Group Abstract As web services will become the predominant method for making information and applications available programmatically
More informationImproved Method for Parallel AES-GCM Cores Using FPGAs
Improved Method for Parallel -GCM Cores Using FPGAs Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez To cite this version: Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez.
More informationInsideView Lead Enrich Setup Guide for Marketo
InsideView Lead Enrich Setup Guide for Marketo ... 1 Step 1: Sign up for InsideView for Marketing... 1 Step 2: Create Custom Fields... 3 Step 3: Create a Webhook for InsideView for Marketing... 5 Step
More informationCHAPTER 10: WEB SERVICES
Chapter 10: Web Services CHAPTER 10: WEB SERVICES Objectives Introduction The objectives are: Provide an overview on how Microsoft Dynamics NAV supports Web services. Discuss historical integration options,
More informationwww.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationT320 E-business technologies: foundations and practice
T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static
More informationRFID Security and Privacy
RFID Security and Privacy Michel Arnaud To cite this version: Michel Arnaud. RFID Security and Privacy. Deploying RFID Challenges, Solutions and Open Issues, INTECH, pp. 366-376, 2011. HAL
More informationIntroduction to the papers of TWG18: Mathematics teacher education and professional development.
Introduction to the papers of TWG18: Mathematics teacher education and professional development Stefan Zehetmeier, Marc Bosse, Laurinda Brown, Alena Hošpesová, Nicolina Malara, Bettina Rösken-Winter To
More informationWA2087 Programming Java SOAP and REST Web Services - WebSphere 8.0 / RAD 8.0. Student Labs. Web Age Solutions Inc.
WA2087 Programming Java SOAP and REST Web Services - WebSphere 8.0 / RAD 8.0 Student Labs Web Age Solutions Inc. 1 Table of Contents Lab 1 - WebSphere Workspace Configuration...3 Lab 2 - Introduction To
More informationP2Prec: A Social-Based P2P Recommendation System
P2Prec: A Social-Based P2P Recommendation System Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger To cite this version: Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger. P2Prec:
More informationITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:
Java WebService BENEFITS OF ATTENDANCE: PREREQUISITES: Upon completion of this course, students will be able to: Describe the interoperable web services architecture, including the roles of SOAP and WSDL.
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationHow to consume a Domino Web Services from Visual Studio under Security
How to consume a Domino Web Services from Visual Studio under Security Summary Authors... 2 Abstract... 2 Web Services... 3 Write a Visual Basic Consumer... 5 Authors Andrea Fontana IBM Champion for WebSphere
More informationMethodology of organizational learning in risk management : Development of a collective memory for sanitary alerts
Methodology of organizational learning in risk management : Development of a collective memory for sanitary alerts Wim Van Wassenhove, Jean-Luc Wybo To cite this version: Wim Van Wassenhove, Jean-Luc Wybo.
More informationBitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
More informationVulnerability Assessment in Autonomic Networks and Services: A Survey
Vulnerability Assessment in Autonomic Networks and Services: A Survey Martín Barrère, Rémi Badonnel, Olivier Festor To cite this version: Martín Barrère, Rémi Badonnel, Olivier Festor. Vulnerability Assessment
More information